LinkedIn emplea cookies para mejorar la funcionalidad y el rendimiento de nuestro sitio web, así como para ofrecer publicidad relevante. Si continúas navegando por ese sitio web, aceptas el uso de cookies. Consulta nuestras Condiciones de uso y nuestra Política de privacidad para más información.
LinkedIn emplea cookies para mejorar la funcionalidad y el rendimiento de nuestro sitio web, así como para ofrecer publicidad relevante. Si continúas navegando por ese sitio web, aceptas el uso de cookies. Consulta nuestra Política de privacidad y nuestras Condiciones de uso para más información.
Social Engineering with SETIntroduction Attack ScenarioSET - Social Engineering toolkit. Attacker creates a malicious link of cloned https://gmail.com which isIt is a useful social engineering tool by David (ReL1k). It can be used to stored locally on server. Victim browses the link and the replica ofperform a number of Social Engineering attacks with minimal effort. gmail.com is opened. This triggers the java applet payload which isSET can be used with Metasploit to additionally perform metasploits delivered on the victim’s browser. Victim is asked to accept the javapowerful post exploitation. This tool can be accessed through web applet’s warning. After, victims acceptance the payload is executed.interface or command line. Payload opens a connection back to attacker’s IP address and port. Attacker has set up a listener to receive the payload connection. Now attacker can remotely capture keystrokes, upload backdoors and openProminent Uses command shell.Gathering credentials 3Shell spawning by browser exploitMass mailing of malicious payloads to spawn shells 2Shell using USB autorunAnti-virus evasion through Payload Encoding 1 2Methods for Social Engineering 3Credential Harvest by Spoofing websites identityBrowser Tab nabbingDropping Java applet payload Getting StartedMetasploit payload delivery usingUSB SET is *nix based toolkit and integrated in Backtrack 4|5 by default. It can be downloaded from (http://www.secmaniac.com/download).Custom email template and payload # tar –xvf set.tar.gzWireless attack using Rouge Access point setup Update SET to the latest :These modes can be used to perform a Social engineering attack on #cd /pentest/exploits/SETvictim. A combination of these could make attack more authentic. #./set-update
SET Web Interfaceroot@bt:/pentest/exploits/SET#./set-webNow, browse URL (http://127.0.0.1:44444) to access SET web interface. Step 2: Attacker entices the victim to browse the malicious link. This link will load the cloned web site (Gmail). Step 3: Victim browses the link. The opened website is replica of Gmail.com (but with IP address of attacker in URL). This triggers to send payload on victims browser (in form of Java applet).SET Command Line Interfaceroot@bt:/pentest/exploits/SET#./setCommand line interface is easy to use and handle victim’s sessions.Command line interface is used for demo in next section.DemoStep 1: Attacker crafts a malicious link with following specification using the following features of SET: Web site phishing attack vector Java Applet method for payload execution SET custom shell with reverse tcp connection Gmail as cloned web site
Step 4:Attacker has already started the listener on its machine to Step5:Victim accepts and runs the payload. Payload creates a receive connection when victim browses and runs the connection back to attackers machine. Attacker is payload. embraced with a SET custom shell. As soon as the victim enters the credentials, the site is redirected to the original web site (i.e. gmail.com). A bunch of activities can be performed on victim: Keylogging Uploading backdoor Download file Command Shell reboot Kill process Grab system Run persistent backdoor etc............(shell is only the beginning)
Step 6:Attacker runs the persistence command on victim’s machine. Step 7:Additionaly, attacker can start the key logging on victim’s This command will initialize and start a random service and machine with “keyscan_start” and “keyscan_dump” creates a backdoor on victim’s machine. Attacker can specify commands. the IP address and port number on which the random service If during any stage of exploit, Anti-virus detects or troubles the (started on victim’s machine) would try to connect back. attacker’s activity, the ‘kill” command can be used to kill the process corresponding to Anti-virus. Also, command “local admin” or “domain admin” could be used to create users on victim’s machine.Persistence feature is very useful in scenario where attacker wants toconnect to victim’s machine from some different IP address. Thestarted service (on victim’s machine) will send a connect request tothe attacker’s IP address every 30 min. This way attacker will have alltime access to victim’s machine.When the attacker’s activity is over, the “removepersistence”command could be used to stop and remove the started service onvictim’s machine.
Extended Usage Online References Functionality of SET can be enhanced further using advanced features such as: Download Site USB payload using autorun http://www.secmaniac.com/download Fake Access point creation and traffic redirection Meterpreter Reference with Wireless attack vector http://en.wikibooks.org/wiki/Metasploit/Meterprete Using Teensy to execute custom payloads (where rClient USB’s are disabled) Mass mailing self created attachments with payloads SET blog http://www.secmaniac.com/blog-history/Conclusion Reverse TCP connection Social Engineer Toolkit is a powerful tool for a http://en.wikipedia.org/wiki/Reverse_connection penetration tester/security enthusiast. This tool includes attack vectors for Social Engineering ranging from Malicious link, email templates, custom payloads, tabnabbing, wireless etc. It supports a variety of payloads and shell (Meterpreter or SET custom shell).